Symantec

Displaying 161-184 of 184 results

  • Webcasts // Aug 2009

    Don't Gamble With Your Recovery: Optimize Information Recovery (Part 3 of 4)

    An organization's information, which includes its customer information and intellectual property, is arguably one of its most critical assets. And recovery of that information in the event of a human error or equipment failure is also critical. However, the time and cost associated with recovering information, especially unstructured information, is...

    Provided By Symantec

  • Webcasts // Dec 2009

    Automate Your Security Awareness Training

    Research shows that the single most important cause of data breaches is the inadvertent violation of basic information security precautions by well-meaning employees. Whether it is storing confidential data unencrypted on a removable device that may be lost or stolen - or simply sharing proprietary information in a crowded elevator...

    Provided By Symantec

  • Webcasts // Dec 2009

    Optimize Your Storage - Storage Resource Management in VMware Environments With Veritas CommandCentral

    With physical storage now separated by two or more degrees from the logical storage an application consumes, traditional storage management approaches are no longer valid. The task of understanding and optimizing resources that applications depend on - which now traverses the virtualization layer - can be a daunting one for...

    Provided By Symantec

  • Webcasts // Dec 2009

    Storage Management and Backup & Recovery: Best Practices for Microsoft Hyper-V Environments

    Virtualization introduces new requirements that affect IT business continuity such as backup, disaster recovery, and storage management. Ensuring rapid and reliable application and data recovery while controlling storage growth can be challenging as virtualization creates a whole new set of complexities. Symantec integrates with the leading virtualization platforms, including Microsoft...

    Provided By Symantec

  • Webcasts // Apr 2009

    Containing Vendor Sprawl: Improve Security, Reduce Risk & Lower Costs

    The presenter of this webcast will explain the cost of managing multiple vendors across disparate products and outline the benefits of consolidating security, storage, and systems management solutions with one strategic vendor. The attendee of this webcast will learn about top security challenges in the next 12 months and how...

    Provided By Symantec

  • Webcasts // Dec 2009

    Backup and Recover Your VMware and Hyper-V Machines in Seconds

    Whether considering implementing a virtual environment or are already experiencing the benefits of virtualization, backing up and recovering the guest machines, files and folders in a virtual environment is a new challenge one have to solve. Symantec Backup Exec 12.5 allows companies to save time and cost associated with data...

    Provided By Symantec

  • Webcasts // Dec 2009

    Data Loss Prevention: 7 Steps to Success

    FORTUNE 500 companies are using Data Loss Prevention (DLP) to stop data breaches and stay ahead of compliance regulations by protecting their most valuable information - including customer data and intellectual property. How? The attendee of this webcast will learn what Data Loss Prevention is and why it is a...

    Provided By Symantec

  • Webcasts // Dec 2009

    Secure and Manage Windows 7 With Symantec

    Worried about moving to Windows 7? Migrating can be disconcerting, but what does it really take to move all of the systems to the new operating system. The presenter of this webcast will show how a migration project can become an opportunity to increase security, increase reliability, add virtualization, and...

    Provided By Symantec

  • Webcasts // Nov 2009

    Small Business Backup and Recovery Basics: Are You Prepared for Downtime or Disaster?

    The presenter of this webcast will focus on what one need to know to protect the data and computer systems so he/she can focus on running tje business. The presenter will explore small business challenges for protecting digital assets and the risks of downtime. Then the presenter will review best...

    Provided By Symantec

  • Webcasts // Nov 2009

    Seeking the Truth on Trend Micro

    Why has Trend Micro avoided participating in security benchmark tests like ones run by reputable organizations such as AV-Comparatives and AV-Test? To find out, Symantec asked AV-Comparatives and AV-Test to benchmark Symantec Endpoint Protection Small Business Edition against Trend's competing products. AV-Test and AV-Comparatives performed on-demand scans and looked at...

    Provided By Symantec

  • Webcasts // Jan 2010

    Why You Should Deduplicate Virtual Machines and Windows Applications at the Source

    The virtualization revolution continues to move through data centers, large and small. The ability to protect and manage the virtual world gets harder every day. Embracing a deduplication solution can give one back control. Deduplicating at the source will not only reduce the storage costs, but it can also free...

    Provided By Symantec

  • Webcasts // Jan 2010

    Optimizing Your Storage Environment With Veritas Storage Foundation

    Organizations are constantly looking to drive automation and reduce storage hardware costs while improving access to data. The attendee of this webcast learns how Veritas Storage Foundation solves these key challenges by leveraging thin provisioning, thin reclamation, solid state drives and storage tiering. Attendees will also learn how these solutions...

    Provided By Symantec

  • Webcasts // Jan 2010

    Maximize MS-Exchange Performance, Scale, and Compliance With Archiving

    Information management is about protecting, managing and finding unstructured information - including information in email - wherever it goes. This webcast will focus on key problems in managing information within the Microsoft Exchange eco-system including keeping Exchange data volumes at predictable levels; gaining control and eliminating PST files; finding information...

    Provided By Symantec

  • Webcasts // Jan 2010

    Securing 2010: Perspectives From Industry Security Bloggers

    With trends such as the rise of polymorphic threats, an increase in reputation hijacking and the vast propagation of rogue security software, 2009 made a mark with its fair share of malicious activity. However, new trends in the industry offered encouragement to security administrators as the year came to a...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec Endpoint Protection

    In this webcast, the presenter will discuss the latest release of Symantec Endpoint Protection (SEP). This release includes new features in such areas as central management, virtualization support, new OS, and new recovery options. If one is responsible for managing or supporting SEP or want to stay on top of...

    Provided By Symantec

  • Webcasts // Jan 2010

    What's New in Symantec NetBackup 7

    The new release of Symantec NetBackup 7 is redefining best-in-class enterprise data protection with advanced technology features that help customers tackle some of the major information management challenges facing today's enterprise IT environments - from the data center to global and remote offices: uncontrolled backup storage growth.

    Provided By Symantec

  • Webcasts // Jun 2009

    How and Why You Need to Protect Your Small Business

    How completely is small business environment protected from today's complex malware, data loss and spam threats? How can one have confidence that the assets are continuously protected while focusing on running the business? Symantec Protection Suite Small Business Edition is an easy to use, "All-in-one" suite that protects critical business...

    Provided By Symantec

  • Webcasts // Jan 2010

    Protect More, Store Less by Upgrading to Symantec Backup Exec 2010

    If one likes most growing companies, one is facing an increased challenge to backup all their data while keeping storage costs under control. How can one improve the Backup Exec backup performance while reducing storage costs? The attendee of this webcast learns how to easily eliminate excess storage consumption with...

    Provided By Symantec

  • Webcasts // Jun 2009

    Enterprise Vault: Real World ROI

    The presenter of this webcast discusses actual scenarios that drive real, tangible returns from archiving and electronic discovery. The presenter will draw on his experiences with Enterprise Vault as the Director of Controls and Compliance at Mitel. The presenter will also walk through ROI opportunities often overlooked by companies evaluating...

    Provided By Symantec

  • Webcasts // Jan 2010

    Overview on the Latest Deduplication Solution by Symantec, NetBackup 5000

    Symantec understands the shifting needs of the data center and has now launched a new deduplication appliance, NetBackup 5000, as an additional option for customers to leverage with their backup strategy and to help maintain information growth within their environment. NetBackup 5000 simplifies the deployment of deduplication to existing NetBackup...

    Provided By Symantec

  • Webcasts // Jun 2009

    Discover How Mid-Size Organizations Effectively Secure Their Environments With the New Symantec Protection Suite

    How completely is the environment protected from today's complex malware, data loss, and spam threats? The presenter of this webcast discusses challenges faced by mid-sized organizations and how Symantec's newest security suite, Symantec Protection Suite Enterprise Edition, can help one address those challenges. Symantec Protection Suite Enterprise Edition creates a...

    Provided By Symantec

  • Webcasts // Jan 2010

    Symantec Internet Security Threat Report Volume XV: Highlights and Key Trends

    The Internet threat landscape continues to change and increasingly complex and sophisticated attacks are targeting the organization's infrastructure and confidential information. This makes it even more important for the attendee to have access to global threat intelligence that can assist them in making informed decisions on how best to protect...

    Provided By Symantec

  • Webcasts // Jun 2009

    Symantec Workflow and Security Responses

    One of the employees looses a laptop or "Accidentally" copies critical data to a USB drive before they leave the building. Perhaps there is a virus outbreak and one needs to get the critical patch out to the endpoints. What is the process for responding to these security threats and...

    Provided By Symantec

  • Webcasts // Jan 2009

    ING Renault F1 Team Takes 1st Place with Symantec Enterprise Vault and NetApp

    View this Webcast to hear why and how joint customer Renault Formula 1 implemented Symantec Enterprise Vault (EV) and NetApp storage for email archival and discovery for over 400,000 messages a week! Organizations are challenged to manage the growth of their unstructured information within email, file systems, SharePoint, and...

    Provided By Symantec